Weighted Feature Selection Techniques for Detecting Impersonation Attack in Wi-Fi Networks

نویسندگان

  • Muhamad Erza Aminanto
  • Paul D. Yoo
  • Harry Chandra Tanuwidjaja
  • Kwangjo Kim
چکیده

As Internet-of-Things (IoT) devices enable pervasive computing in our daily lives, more and more devices are connected to Wi-Fi networks. The public access to Wi-Fi network leads to exploitable vulnerabilities that can be inverted as attacks. Impersonation attack is an active malicious action where unauthorized users masquerade themself as authorized to gain privileges. Detecting impersonation attacks remains a challenging task due to its similar properties with benign packets. Moreover, the pervasiveness of IoT devices connected to a Wi-Fi network generates a complex, largescale, and high-dimensional data, which leads to difficulties in real-time detection and mitigation. Selecting the best features is one of the challenging issues to improve the performance of the classifier. In this study, we examine the feature weighting methods of existing machine learners and how they could be used for the accurate selection for impersonation attack features. We test and validate the utility and usefulness of the selected features using a standard neural network. This study finally demonstrates that the proposed weight-based machine learning model can outperform other filterbased feature selection models. We evaluated the proposed model on a well-referenced Wi-Fi networks benchmark dataset, namely, AWID. The experimental results not only demonstrate the effectiveness of the proposed model achieving an accuracy of 99.86% but also prove that combining a weightbased feature selection method with a light machine-learning classifier leads to a significantly better performance compared to the best result reported in the literature.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning

Intrusion Detection System (IDS) has been becoming a vital measure in any networks, especially Wi-Fi networks. Wi-Fi networks growth is undeniable due to a huge amount of tiny devices connected via Wi-Fi networks. Regrettably, adversaries may take advantage by launching an impersonation attack, a common wireless network attack. Any IDS usually depends on classification capabilities of machine l...

متن کامل

Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach

WiFi network traffics will be expected to increase sharply in the coming years, since WiFi network is commonly used for local area connectivity. Unfortunately, there are difficulties in WiFi network research beforehand, since there is no common dataset between researchers on this area. Recently, AWID dataset was published as a comprehensive WiFi network dataset, which derived from real WiFi tra...

متن کامل

A survey on the wi-fi wireless network systems penetration approaches

Wireless network technology made it possible to communicate easily using the electromagnetic waves leading to removing the biggest barrier in portable communications. As these networks use the air as the communication medium which leads to face with more vulnerabilities. Wireless networks play a vital role in our life in a way that all devices ranging from local modems to organizational equipme...

متن کامل

An Indoor Positioning System Based on Wi-Fi for Energy Management in Smart Buildings

To offer indoor services to occupants in the context of smart buildings, it is necessary to consider information concerning to the identity and location of the occupants. This paper proposes an indoor positioning system (IPS) based on Wi-Fi fingerprint and K-nearest neighbors (KNN) method. The positioning of a mobile device (MD) using Wi-Fi technology involves online and offline phases. In this...

متن کامل

Wi-Trust : Computational Trust and Reputation Management for Stronger Hotspot 2.0 Security

In its list of top ten smartphone risks, the European Union Agency for Network and Information Security ranks network spoofing attacks as number 6. In this paper, we present how we have validated different computational trust and reputation management techniques by means of implemented prototypes in real devices to mitigate malicious legacy Wi-Fi hotspots including spoofing attacks. Then we exp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016